HotSec '11 Banner

USENIX Security '11

WORKSHOP PROGRAM

All sessions will take place in California West unless otherwise noted.

All breakfast and refreshment breaks will take place in the California East/West Foyer,  Elizabethan Foyer, and Elizabethan C.

Tuesday, August 9, 2011
8:30 a.m.–9:00 a.m.    Continental Breakfast
9:00 a.m.–9:05 a.m.

Welcome

Program Chair: Patrick McDaniel, Pennsylvania State University

Video View the Video

MP3 Icon Listen to the MP3

9:05 a.m.–10:35 a.m.

New Age System Security

Session Chair: Patrick McDaniel, Pennsylvania State University

Building Secure Robot Applications
Murph Finnicum and Samuel T. King, University of Illinois

Read the Full paper

Video View the Video

MP3 Icon Listen to the MP3

Security Fusion: A New Security Architecture for Resource-Constrained Environments
Suku Nair, Subil Abraham, and Omar Al Ibrahim, Southern Methodist University

Read the Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements
Youngjune L. Gwon, H.T. Kung, and Dario Vlah, Harvard University

Read the Full paper (updated 7/7/11)

Video View the Video | Slides

MP3 Icon Listen to the MP3

Video View the Post-Session Q&A Video

MP3 Icon Listen to the Post-Session Q&A MP3

10:35 a.m.–11:00 a.m.    Break with coffee and tea
11:00 a.m.–12:30 p.m.

Privacy and Anonymity

Session Chair: Patrick Traynor, Georgia Institute of Technology

Privacy-Preserving Applications on Smartphones
Yan Huang, Peter Chapman, and David Evans, University of Virginia

Read the Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

Public vs. Publicized: Content Use Trends and Privacy Expectations
Jessica Staddon and Andrew Swerdlow, Google

Read the Full paper

Video View the Video

MP3 Icon Listen to the MP3

Herbert West—Deanonymizer
Mihir Nanavati, Nathan Taylor, William Aiello, and Andrew Warfield, University of British Columbia

Read the Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

Video View the Post-Session Q&A Video

MP3 Icon Listen to the Post-Session Q&A MP3

12:30 p.m.–2:00 p.m.    Workshop Luncheon served in the Colonial Room
2:00 p.m.–3:30 p.m.

Information Protection

Session Chair: Vern Paxson, University of California, Berkeley

Towards Practical Avoidance of Information Leakage in Enterprise Networks
Jason Croft and Matthew Caesar, University of Illinois at Urbana-Champaign

Read the Full paper

Video View the Video

MP3 Icon Listen to the MP3

Towards Client-side HTML Security Policies
Joel Weinberger, University of California, Berkeley; Adam Barth, Google; Dawn Song, University of California, Berkeley

Read the Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion
Liang Cai and Hao Chen, University of California, Davis

Read the Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

Video View the Post-Session Q&A Video

MP3 Icon Listen to the Post-Session Q&A MP3

3:30 p.m.–4:00 p.m.    Break with beverages
4:00 p.m.–5:00 p.m.

Emerging Areas in Security

Session Chair: Sam King, University of Illinois at Urbana-Champaign

On Dynamic Malware Payloads Aimed at Programmable Logic Controllers
Stephen McLaughlin, Pennsylvania State University

Read the Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

Effective Digital Forensics Research Is Investigator-Centric
Robert J. Walls, Brian Neil Levine, and Marc Liberatore, University of Massachusetts Amherst; Clay Shields, Georgetown University

Read the Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

Video View the Post-Session Q&A Video

MP3 Icon Listen to the Post-Session Q&A MP3

footer
? Need help? Use our Contacts page.

Last changed: 31 May 2012 mpn